I'm using ipchains on this one.

\r\n
\r\n
#!/bin/sh                                                                   \r\n                                                                            \r\n# This script sets up the NAT and firewall for the box, and is run when the \r\n# ppp connection to Bell comes up.                                          \r\n                                                                            \r\n/sbin/ipchains -A input -j ACCEPT -i ppp0 -s 0/0 67 -d 0/0 68 -p udp        \r\n                                                                            \r\n/sbin/depmod -a                                                             \r\n/sbin/modprobe ip_masq_ftp                                                  \r\n/sbin/modprobe ip_masq_raudio                                               \r\n                                                                            \r\necho "1" > /proc/sys/net/ipv4/ip_dynaddr                                    \r\necho "1" > /proc/sys/net/ipv4/ip_forward                                    \r\necho "1" > /proc/sys/net/ipv4/ip_always_defrag                              \r\necho "1" > /proc/sys/net/ipv4/ip_masq_udp_dloose                            \r\n                                                                            \r\n/sbin/ipchains -M -S 7200 10 160                                            \r\n                                                                            \r\nipchains -F input                                                           \r\nipchains -F output                                                          \r\nipchains -F forward                                                         \r\n                                                                            \r\nipchains -P input ACCEPT                                                    \r\nipchains -P output ACCEPT                                                   \r\nipchains -P forward DENY                                                    \r\nipchains -A input -s 192.168.0.0/24 -i ppp0 -j DENY                         \r\nipchains -A input -s 127.0.0.0/8 -i ppp0 -j deny                            \r\nipchains -A forward -s 192.168.0.0/24 -i ppp0 -j MASQ                       \r\n

\r\n

I'd like to be able to set the policy of input deny, but whenever I do I end up being able to send things out by explicitly allowing input traffic from 192.168.0.0 to eth1 (internal interface) but I never get anything back as the incoming packets get killed.

At any rate... pointers on this one would be welcome. Thanks!